Virus Protection Often Lets Destructive Trojans Gallop on by
During the Trojan War, the city of Troy and its walls was thought to be impenetrable. As history goes, their downfall was allowing a wooden
horse offered as a gift, into the city walls. Unbeknownst to the Trojans, the “gift” was filled with their enemies armed and ready to attack. So,
what appeared to be a gift was actually an attack. The same is true with destructive Internet Trojans: they appear to be computer programs with a
certain function, but in actuality they are disguising more sinister plans (such as accessing your computer files from a remote location.) When
it comes to worm and virus detection antivirus software works great, but there is spyware and Trojans that sneak by since they are technically
not really viruses. This is a problem because if there is internet vulnerability, Trojan creators seem to find them-and fast. In December 2004
hackers needed only one week to create a Trojan to targeted vulnerabilities in internet explorer security.
For example, the Trojan called LowZone will actually lower your internet explorer security settings! So, what can you do to keep Trojans out
if virus protection doesn’t always do the trick? First, it is vital that you have virus software since they catch many of these programs. You
will also want to download a free version of anti-spyware software. This will block Trojans or detect and delete them from your computer. Since
they also block spy-and-adware these programs are excellent for deterring what could lead to other computer problems. SpyBot Search & Destroy
is free and one of the most popular such programs. With SpyBot it is important to choose the Immunize button first to make sure you are checking
for all possible malicious programs known. For added PC protection perform a free online Trojan scanner which you can find online.
Also, if you use Microsoft Windows visit for updates on internet explorer security, Trojan warnings and security patches visit the Microsoft
web site. Red Hat/Linux users can find the latest information about their security vulnerabilities at the Red Hat security updates Web page.
Software for Trojans and Virus Protection
Pc cillin Antivirus